Method and system for identifying user information in social network
First Claim
Patent Images
1. A method for identifying user information, the method performed by at least one computer processor and comprising:
- obtaining a first user identifier of a user in a social network;
obtaining identity authentication information corresponding to the first user identifier;
determining whether the identity authentication information is associated with a second user identifier;
storing, in response to determining that the identity authentication information is associated with the second user identifier, an association relationship between the first user identifier and the second user identifier;
performing data mining on a user behavior, and estimating a master-slave relationship between the first user identifier and the second user identifier based on the data mining on the user behavior; and
verifying the estimated master-slave relationship between the first user identifier and the second user identifier based on the stored association relationship, the stored association relationship comprising a master-slave relationship that is established between the first user identifier and the second user identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for identifying user information includes obtaining a first user identifier of a user in a social network; obtaining identity authentication information corresponding to the first user identifier; determining whether the identity authentication information is associated with a second user identifier; and storing, when the identity authentication information is associated with the second user identifier, an association relationship between the first user identifier and the second user identifier.
-
Citations
20 Claims
-
1. A method for identifying user information, the method performed by at least one computer processor and comprising:
-
obtaining a first user identifier of a user in a social network; obtaining identity authentication information corresponding to the first user identifier; determining whether the identity authentication information is associated with a second user identifier; storing, in response to determining that the identity authentication information is associated with the second user identifier, an association relationship between the first user identifier and the second user identifier; performing data mining on a user behavior, and estimating a master-slave relationship between the first user identifier and the second user identifier based on the data mining on the user behavior; and verifying the estimated master-slave relationship between the first user identifier and the second user identifier based on the stored association relationship, the stored association relationship comprising a master-slave relationship that is established between the first user identifier and the second user identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for identifying user information, comprising:
-
at least one memory operable to store program code; and at least one processor operable to read the program code and operate as instructed by the program code, the program code comprising; identifier obtaining code configured to cause the at least one processor to obtain a first user identifier of a user in a social network; information obtaining code configured to cause the at least one processor to obtain identity authentication information corresponding to the first user identifier; first determining code configured to cause the at least one processor to determine whether the identity authentication information is associated with a second user identifier; processing code configured to, in response to determining that the identity authentication information is associated with the second user identifier, cause the at least one processor to store an association relationship between the first user identifier and the second user identifier; and verification code configured to cause the at least one processor to perform data mining on a user behavior, estimate a master-slave relationship between the first user identifier and the second user identifier based on the data mining on the user behavior, and verify the estimated master-slave relationship between the first user identifier and the second user identifier based on the stored association relationship, the stored association relationship comprising a master-slave relationship that is established between the first user identifier and the second user identifier. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer readable storage medium that stores computer readable instructions which, when executed by one or more processors, cause the one or more processors to perform:
-
obtaining a first user identifier of a user in a social network; obtaining identity authentication information corresponding to the first user identifier; determining whether the identity authentication information is associated with a second user identifier; storing, in response to the identity authentication information being associated with the second user identifier, an association relationship between the first user identifier and the second user identifier; performing data mining on a user behavior; estimating a master-slave relationship between the first user identifier and the second user identifier based on the data mining on the user behavior; and verifying the estimated master-slave relationship between the first user identifier and the second user identifier based on the stored association relationship, the stored association relationship comprising a master-slave relationship that is established between the first user identifier and the second user identifier. - View Dependent Claims (19, 20)
-
Specification